Lucene search

K
osvGoogleOSV:DLA-286-1
HistoryJul 30, 2015 - 12:00 a.m.

squid3 - security update

2015-07-3000:00:00
Google
osv.dev
10

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

Alex Rousskov discovered that Squid configured with cache_peer and
operating on explicit proxy traffic does not correctly handle CONNECT
method peer responses. In some configurations, it allows remote clients to
bypass security in an explicit gateway proxy.

For Debian 6 Squeeze, this problem has been fixed in squid3 version
3.1.6-1.2+squeeze5. We recommend that you upgrade your squid3 packages.

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P